Lucene search

K
nessusThis script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.FOXIT_READER_4_3_1_0218.NASL
HistoryFeb 25, 2011 - 12:00 a.m.

Foxit Reader < 4.3.1.0218 Multiple Vulnerabilities

2011-02-2500:00:00
This script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
11

The version of Foxit Reader installed on the remote Windows host is prior to 4.3.1.0218. It is, therefore, affected by multiple vulnerabilities :

  • An integer overflow condition exists when parsing certain ICC chunks. An attacker can exploit this, via crafted ICC chunks in a PDF file, to cause a heap-based buffer overflow, resulting in the execution of arbitrary code. (CVE-2011-0332)

  • A flaw exists in the JavaScript API related to the createDataObject() function. An attacker can exploit this, via a crafted PDF file using a call to that function, to create or overwrite arbitrary files.

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(52458);
  script_version("1.14");
  script_cvs_date("Date: 2019/01/02 11:18:37");

  script_cve_id("CVE-2011-0332");
  script_bugtraq_id(46565, 46763);
  script_xref(name:"EDB-ID", value:"16978");
  script_xref(name:"Secunia", value:"43329");
  script_xref(name:"Secunia", value:"43776");

  script_name(english:"Foxit Reader < 4.3.1.0218 Multiple Vulnerabilities");
  script_summary(english:"Checks the version of Foxit Reader.");

  script_set_attribute(attribute:"synopsis", value:
"A PDF viewer installed on the remote host is affected by multiple
vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"The version of Foxit Reader installed on the remote Windows host is
prior to 4.3.1.0218. It is, therefore, affected by multiple
vulnerabilities :

  - An integer overflow condition exists when parsing
    certain ICC chunks. An attacker can exploit this, via
    crafted ICC chunks in a PDF file, to cause a heap-based
    buffer overflow, resulting in the execution of arbitrary
    code. (CVE-2011-0332)

  - A flaw exists in the JavaScript API related to the
    createDataObject() function. An attacker can exploit
    this, via a crafted PDF file using a call to that
    function, to create or overwrite arbitrary files.
");
  # https://scarybeastsecurity.blogspot.com/2011/03/dangerous-file-write-bug-in-foxit-pdf.html
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?8294358a");
  script_set_attribute(attribute:"see_also", value:"https://www.foxitsoftware.com/support/security-bulletins.php");
  script_set_attribute(attribute:"see_also", value:"https://www.foxitsoftware.com/company/press.php?id=210");
  script_set_attribute(attribute:"solution", value:
"Upgrade to Foxit Reader version 4.3.1.0218 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_set_attribute(attribute:"metasploit_name", value:'Foxit PDF Reader 4.2 Javascript File Write');
  script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
  
  script_set_attribute(attribute:"vuln_publication_date", value:"2011/02/25");
  script_set_attribute(attribute:"patch_publication_date", value:"2011/02/24");
  script_set_attribute(attribute:"plugin_publication_date", value:"2011/02/25");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe",value:"cpe:/a:foxitsoftware:foxit_reader");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("foxit_reader_installed.nasl");
  script_require_keys("installed_sw/Foxit Reader");

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("install_func.inc");

app = "Foxit Reader";
install = get_single_install(app_name:app, exit_if_unknown_ver:TRUE);
version = install["version"];
path    = install["path"];

report = NULL;

fixed_version = "4.3.1.0218";
if (ver_compare(ver:version, fix:fixed_version, strict:FALSE) < 0)
{
  port = get_kb_item("SMB/transport");
  if (!port)
    port = 445;

  report =
    '\n  Path              : ' + path +
    '\n  Installed version : ' + version +
    '\n  Fixed version     : ' + fixed_version + '\n';

  security_report_v4(port:port, extra:report, severity:SECURITY_HOLE);
  exit(0);
}
else
   audit(AUDIT_INST_PATH_NOT_VULN, app, version, path);
VendorProductVersionCPE
foxitsoftwarefoxit_readercpe:/a:foxitsoftware:foxit_reader
Related for FOXIT_READER_4_3_1_0218.NASL